Pages

Wednesday, July 29, 2015

Network Deception Using Decoys

I wrote this article a few months back in regards to why network deception is a technique that security folk should start using more. It's something relatively inexpensive, or free if go completely open source, that could save your butt. It still seems to be somewhat passe when I speak to people about it, but I've noticed some up-and-coming security vendors using these techniques as services, so I'm encouraged that this will someday be a staple of security monitoring and operations.

If the bad guys can use deception while compromising your network, why not turn the tables on them and use similar techniques to alert of their presence? This has been going on for ever in physical warfare and it should be no different in fighting adversaries in the digital world.